[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] I'm Running A Tor Exit Node And NEVER Initiated It



On 05/29/2016 04:23 PM, Percy Blakeney wrote:
> I did just that.  TWICE.  I now have a total of 5 phones, 3 laptops, 2
> desktops 2 printers, and I'm now on my third router/modem.  Whomever,
> whatever this is knows how to get into the firmware.  I know this sounds
> crazy but it's true. I'd give anything for someone to come here and see for
> themselves.

Well, this is rather off-topic for this list. But whatever you're
dealing with, it must be getting in somehow. Three possibilities come to
mind: 1) infected files; 2) network exploits; and 3) physical access.
Rich document formats may carry malware. Perhaps your ISP has been
compromised. I've read that drug gangs have infiltrated some Mexican
ISPs, for example. Maybe someone is black-bagging you.

First review your physical security. Create a safe work area, with a
good digital lock, and hidden security cameras.

Maybe start with an offline machine. Pick a random large city, drive
there, and buy a laptop with cash. Don't reveal your identity. If you
must go online, buy a separate WiFi dongle, and disable onboard WiFi.
Then only use public WiFi, but never anywhere near where you live.

But again, this is off-topic here. If you want to talk more, email me
off-list.

> On Sun, May 29, 2016 at 3:53 PM, Mirimir <mirimir@xxxxxxxxxx> wrote:
> 
>> On 05/29/2016 10:27 AM, Percy Blakeney wrote:
>>> Whomever is and has been behind this is selective with what I can and
>> can't
>>> see.  I KNOW our electronics are and have been controlled since we moved
>>> here January 2014.  I know this because at one time "they" were
>> interacting
>>> with me on via my desktop.  I was asked if "they" could run a d-bus
>> session
>>> on another computer I have connected.  Not knowing what a d-bus session
>> was
>>> "they" gave me a step by step run down on how to do it.  I did what
>> "they"
>>> asked because it was kind of exciting.  Now in retrospect it's more scary
>>> than anything else. ...
>>
>> Given what you've said, you might want to replace all of your
>> electronics. The router, and all computers and other devices that have
>> been connected to it, through wires or WiFi. Maybe also change ISP.
>>
>> That may seem extreme. For computers, it might be sufficient to replace
>> HDDs/SSDs. But smartphones, you should just replace entirely. The
>> concern is that malware can be hidden in other components, not just in
>> HDDs/SSDs.
>>
>> Also, be very careful about transferring files from old machines. If you
>> must, transfer individual files, not entire folders. Ideally, you would
>> scan each file for malware in an intermediate throwaway machine, running
>> a different OS. Maybe OSX, if your other machines are Windows and Linux.
>> Or Windows, if your other machines are OSX and Linux. You can use USB
>> flash drives. But use a given one only for a given pair of machines, to
>> reduce the risk of transferring malware.
>>
>> <SNIP>
>>
>> _______________________________________________
>> tor-relays mailing list
>> tor-relays@xxxxxxxxxxxxxxxxxxxx
>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>>
> 
> 
> 
> _______________________________________________
> tor-relays mailing list
> tor-relays@xxxxxxxxxxxxxxxxxxxx
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
> 
_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays